You are on page 1of 28

IPPF – Practice Guide

Data Analysis
Technologies
Global Technology Audit Guide (GTAG®) 16
Data Analysis Technologies

Authors:
Altus J. Lambrechts, CISA, CRISC
Jacques E. Lourens, CIA, CISA, CGEIT, CRISC
Peter B. Millar
Donald E. Sparks, CIA, CISA

Reviewers:
The IIA–South Africa
Chartered Institute of Internal Auditors (U.K.)

August 2011

Copyright © 2011 by The Institute of Internal Auditors located at 247 Maitland Avenue, Altamonte Springs, FL 32701, USA.
All rights reserved. Published in the United States of America.

Except for the purposes intended by this publication, readers of this document may not reproduce, store in a retrieval system,
redistribute, transmit in any form by any means — electronic, mechanical, photocopying, recording, or otherwise — display, rent,
lend, resell, commercially exploit, or adapt the statistical and other data contained herein without the permission of The IIA.

The information included in this document is general in nature and is not intended to address any particular individual, internal
audit activity, or organization. The objective of this document is to share tools, resources, information, and/or other knowledge that is
accurate, unbiased, and timely. However, based on the date of issuance and changing environments, no individual, internal audit
activity, or organization should act on the information provided in this document without appropriate consultation or examination.
GTAG — Table of Contents

Executive Summary..........................................................................................................................................2

Introduction.....................................................................................................................................................3

How Can Data Analysis Help Internal Auditors? ............................................................................5

Using Data Analysis Technology.............................................................................................................7

Elaboration on Key Technology Concepts.........................................................................................9

Where Should Internal Auditors Begin?............................................................................................14

Conclusion........................................................................................................................................................16

Appendix A: Example – Data Analysis for Procurement...............................................................17

Appendix B: Ranking Matrix for Data Analysis Software Selection.....................................19

Appendix C : Audit Department Data Analysis Usage Maturity Levels.................................21

1
GTAG — Executive Summary

1. Executive Summary This guide aims to help CAEs understand how to move
beyond the tried and true methods of manual auditing toward
Change can be difficult for anyone. Inventor Charles improved data analysis using technology. After reading this
Kettering once said, “The world hates change, yet it is the guide you will:
only thing that has brought progress.” This adage is particu- • Understand why data analysis is significant to your
larly true when it comes to moving beyond the tried and true organization.
methods of manual auditing towards computer assisted audit
techniques (CAATs) and the use of data analysis. • Know how to provide assurance more efficiently
Although internal auditors have been doing data analysis with the use of data analysis technology.
for more than 25 years, it has only recently started to become • Be familiar with the challenges and risks that you
standard practice. By our nature, most accountants and audi- will face when implementing data analysis tech-
tors are inclined to stick with what has worked in the past, nology within your department.
rather than reach outside our comfort zones for an alterna-
tive that could help us accomplish more. What we should be • Know how to incorporate data analysis at your orga-
asking ourselves is, “Could we do something electronically nization through adequate planning and appropriate
in 20 minutes that would normally take us 20 hours, and resource structures.
possibly improve the quality of our work as a result?” • Recognize opportunities, trends, and advantages of
Because all organizations are impacted by IT in various making use of data analysis technology.
forms, it is nearly impossible to conduct an effective audit
without using technology. Current audit standards already
require consideration of the use of data analysis for good To further assist CAEs and other individuals who use this
reason. The use of data analysis allows auditors to view high- guide, we also have included a detailed example of the appli-
level organizational operations and drill down into the data. cation of data analytics to procurement control activities in
It can be used throughout all phases of an audit. It also can Appendix A. Consistent with where most data analysis starts,
be used to identify errors, which may lead to the discovery these examples are largely focused on simple data matching
of fraudulent activity. While technology may be used to and reperformance of automated system functionality used in
improve the audit and reduce the time necessary to complete providing assurance.
the engagement, some auditors may still be reluctant to make
the switch.
While data analysis could theoretically be performed
manually, it is most effective when implemented using data
analysis technology. It is important for chief audit execu-
tives (CAEs) and their staff to realize that the use of data
analysis technology is not limited to the scope and activities
associated with IT audit alone. The use of technology-based
audit techniques in general and data analysis technology
in particular is far more widespread. The IIA defines tech-
nology-based audit techniques as, “Any automated audit
tool, such as generalized audit software, test data generators,
computerized audit programs, specialized audit utilities, and
CAATs.”1 Owing to the broad scope of this definition, the
focus of this GTAG is on data analysis technologies. The use
of data analysis technology is part of the bigger technology
armor that assists auditors in increasing audit coverage,
performing more thorough and consistent audits, and ulti-
mately increasing the levels of assurance that they provide
their organizations.

www.theiia.org/guidance/standards-and-guidance/ippf/standards/
1 

glossary

2
GTAG — Introduction

2. Introduction • Productivity and cost savings


Data analysis technology has enabled a number
Data analysis as used by internal auditors is the process of of organizations to realize significant productivity
identifying, gathering, validating, analyzing, and interpreting improvements in audit planning, risk assessment,
various forms of data within an organization to further the and increasing the breadth and depth of audit
purpose and mission of internal auditing. Data analysis coverage during the engagement. Ultimately, this
is typically used throughout the execution of assessment has enabled audit departments to broaden the scope
activities as well as providing other value-added consulting of their assurance activities, without having to
activities. increase audit staff. In some circumstances, auto-
Data analysis technologies are computer programs the mation of analytic steps has lead to cost savings
auditor uses as part of the audit to process data of audit signifi- through the reduction of staff necessary to complete
cance to improve the effectiveness and efficiency of the audit the audit plan.
process. When data analysis is being used, the overall objec- • Efficiency in data access
tive and scope of an audit does not change. Data analysis Data analysis technologies enable auditors to access
must be seen as another tool that can be used to achieve the and query data by themselves, thereby decreasing
objective of the specific audit. their reliance on busy IT personnel having to run
Data analysis tools may consist of packaged, purpose- data extracts. This helps provide a higher degree
written utility programs or system management programs. of confidence in the accuracy and completeness
Different technologies fall under this concept, including
database interrogation tools (generic standard query
language–based tools) and audit-specific packages.

Opportunities Related Standards/Guidance


In today’s economic environment many companies are Standard 2300: Performing the Engagement
striving to reduce costs. Together with new audit standards, n Internal auditors must identify, analyze, evaluate,
this provides internal audit departments with an opportunity and document sufficient information to achieve
to make use of data analysis and makes the concept “do more the engagement’s objectives.
with less” a potential reality.
Data analysis also can be an enabling technology that Standard 2310: Identifying Information
assists audit departments in fulfilling their responsibilities to n Internal auditors must identify sufficient, reliable,
evaluate and improve the governance, risk management, and relevant, and useful information to achieve the
control (GRC) processes as part of the assurance function. engagement’s objectives.
Data analysis gives audit departments the ability to conduct Standard 2320: Analysis and Evaluation
assessments on the operating effectiveness of internal
controls and to look for indicators of emerging risk. The use n Internal auditors must base conclusions and
of data analysis throughout the audit cycle is discussed later engagement results on appropriate analyses and
in this section. evaluations.
In the days when mainframe computers ruled the business Practice Advisory 2320-1: Analytical Procedures
world, only the best funded internal audit functions could n Internal auditors may use analytical procedures
even consider moving data analysis activities into the depart- to obtain audit evidence. Analytical procedures
ment. Over the past decade, technology has advanced at a involve studying and comparing relationships
great speed, resulting in price reductions that have made it among both financial and nonfinancial information.
easier to implement data analysis within an organization. The application of analytical procedures is based
Through this, audit analytics have evolved from specialized on the premise that, in the absence of known
technology that was once the domain of specialized IT audi- conditions to the contrary, relationships among
tors into an essential technique that has a valuable role to information may reasonably be expected to exist
play in the majority of audit procedures. Many audit func- and continue. Examples of contrary conditions
tions now aim to integrate audit analytics throughout the include unusual or nonrecurring transactions or
audit process and expect all auditors to have an appropriate events; accounting, organizational, operational,
level of technological competency. environmental, and technological changes;
There are many benefits that may be realized from the use inefficiencies; ineffectiveness; errors; fraud; or
of data analysis, including: illegal acts.

3
GTAG — I ntroduction

of the data population being analyzed and intro-


duces efficiencies in verifying the accuracy of that
information.
• Audit risk
The use of data analysis can significantly reduce
audit risk by honing the risk assessment and strati-
fying the population.

Trends
There is increasing pressure on audit departments to do
more with less. Internal audit’s role is at the forefront as the
profession looks to provide more assurance and transpar-
ency to the audit committee and senior management around
everyday organizational activities. To accomplish this, the
current focus of many audit teams is to enhance the quality
of their work and effectiveness of the department using tech-
nology. They need to be more productive and better focused
on emerging risks. Audit teams also are seeking to deliver
timely value to the enterprise by distributing, tracking, and
escalating potential issues for better organizational insight
and control.2

IIA Global Audit Information Network (GAIN) 2009 IT Audit


2  

Benchmarking Survey.

4
GTAG — How Can Data Analysis Help Internal Auditors?

3. How Can Data Analysis


Help Internal Auditors? Benford’s law definition
n Benford’s Law gives the expected frequencies of
Data Analysis can help internal auditors meet their the digits in tabulated data. The set of expected
auditing objectives. By analyzing data within key organi- digit frequencies is named after Frank Benford,
zational processes, internal audit is able to detect changes a physicist who published the seminal paper on
or vulnerabilities in organizational processes and potential the topic (Benford, 1938). Benford found that
weaknesses that could expose the organization to undue or contrary to intuition, the digits in tabulated data
unplanned risk. This helps identify emerging risk and target are not all equally likely and have a biased skew-
audit resources to effectively safeguard the organization from ness in favor of the lower digits.
excessive risk and improve overall performance. This also  
enables internal audit to identify changes in organizational
n Benford begins his paper by noting that the first
processes and ensure that it is auditing today’s risks — not
few pages of a book of common logarithms show
yesterday’s.
more wear than the last few pages. From this
By analyzing data from a variety of sources against control
he concludes that the first few pages are used
parameters, business rules, and policies, internal audit can
more often than the last few pages. The first few
provide fact-based assessments of how well automated
pages of the logarithm books give us the logs of
controls are operating. Data analysis technology also can be
numbers with low first digits (e.g., 1, 2, and 3).
used to determine if semi-automated or manual controls are
He hypothesized that the first pages were worn
being followed by seeking indicators in the data. By analyzing
because the most ‘‘used’’ numbers in the world
100 percent of relevant transactions and comparing data
had a low first digit. The first digit is the leftmost
from diverse sources, internal audit can identify instances of
digit in a number (for example, the first digit of
fraud, errors, inefficiencies, or noncompliance.
110,364 is a 1). Zero is inadmissible as a first digit
A number of specific analytical techniques have been
and there are nine possible first digits (1, 2, . . . ,
proven highly effective in analyzing data for audit purposes.
9). The signs of negative numbers are ignored and
• Calculation of statistical parameters (e.g., averages, so the first two digits of 34.83 are 34.
standard deviations, highest and lowest values) to  
identify outlying transactions. n Benford’s results showed that, on average, 30.6
• Classification to find patterns and associations percent of the numbers had a first digit 1, and
among groups of data elements. 18.5 percent of the numbers had a first digit
2. This means that 49.1 percent of his records
• Stratification of numeric values to identify unusual had a first digit that was either a 1 or a 2. At the
(i.e., excessively high or low) values. other end of the ‘‘digit-scale’’ only 4.7 percent
• Digital analysis using Benford’s Law to identify of his records had a first digit 9. Benford then
statistically unlikely occurrences of specific digits in saw a pattern to his results. Forensic Analytics:
naturally occurring data sets. Methods and Techniques for Forensic Accounting
Investigations (Wiley Corporate F&A) Mark Nigrini
• Joining different data sources to identify inappropri- (Author)
ately matching values such as names, addresses, and
account numbers in disparate systems.
• Duplicate testing to identify simple and/or complex
duplications of organizational transactions such as Data analysis can be used throughout a typical audit cycle.
payments, payroll, claims, or expense report line While individual audit cycle definitions and steps may vary,
items. the following breakdown provides some of the ways data
• Gap testing to identify missing numbers in sequen- analysis can be employed during various stages in an audit
tial data. cycle.

• Summing of numeric values to check control totals


that may have errors. Planning
• Validating data entry dates to identify postings or Data analysis can be greatly effective in identifying data-
data entry times that are inappropriate or suspicious. driven indicators of risk or emerging risk in an organization.

5
GTAG — How Can Data Analysis Help Internal Auditors?

This can help internal audit define and create an audit plan data populations. Once initial analysis is done, efforts can
that focuses on the areas of highest concern. The internal be focused on areas where exceptions were found, making
audit activity should consider prioritizing the use of data more efficient use of audit resources. The ability to automate
analysis for risk assessment during the audit planning stage, repetitive tests by using analytic scripts increases overall
where the data is available, and where this approach is departmental efficiency and allows for greater insight into
applicable. high risk areas. Results and scripts should be stored in a
Data analysis technology can be effectively employed to centralized repository allowing audit team members to review
identify indicators of risk in a variety of processes. Consider findings and access and re-use analytic procedures.
the following examples:

• Revenue by location, division, or product line. Review


• Revenue backlogs by value and age. The analytic routines and the results they generate should
• Personnel changes in key positions (legal, finance, be included in the audit review. This helps ensure that the
research & development). conclusions drawn from using data analysis can be relied
on and that any mistakes in the query are identified and
• Volume of manual journal entries or credit notes. corrected or that conclusions that were drawn from those
• Aging accounts receivable balances or inventory results are not erroneous.
levels.
• Vendor management (number of vendors, volume of
transactions).
• Procurement card vs. purchase order procurement.
• Average days for customer payment.
• Industry code of supplier on credit card purchases.

Preparation
Data access and preparation can be a challenging step within
the audit process. Requests to IT departments can take weeks
and the resulting data can often be incomplete or incorrect,
making for an inefficient process. By using data analysis tech-
nology during the audit preparation phase, many of these
delays can be avoided. Auditors skilled in the use of data
analysis can source the data required for the audit engage-
ment, do data integrity and validity checks, and prepare test
routines for staff auditors to use once the audit commences.
This will provide audit teams with streamlined access to
reliable data sets or even automated access to multiple data
sources to allow for quick and efficient analysis of data. Data
should be housed in a centralized repository allowing the
audit team to analyze data sets according to their authoriza-
tion and need for access.

Testing
A great deal of audit testing uses organizational data to some
extent — often to a significant extent. Due to ever increasing
amounts of data, some auditors have relied on techniques
such as sampling or spot checks. These techniques may
be ineffective at uncovering anomalies and indicators of
failed or inefficient internal controls. To improve effective-
ness in the search for errors and unusual transactions, audit
teams can use data analysis technology to analyze entire

6
GTAG — Using Data Analysis Technology

4. Using Data Analysis unknown issues. And just as important, internal audit leaders
know and are confident the audit tests being conducted are
Technology done in a manner consistent with their directions. And while
they may not roll out the software to 100 percent of the staff
initially, in a few short months many staff would be able to
4.1 Data Analysis Software Tools perform data analysis.
As with the adoption of any software tool or technology,
Leading internal audit activities have a lot in common when
initial product acquisition cost should be considered, in
looking for data analysis tools. They look for data analysis
addition to ongoing maintenance and support costs for the
tools (i.e., software) that are easy to learn and can realisti-
technology(s) selected. A needs assessment should be carried
cally be used by the entire audit staff, not just a select few.
out to ensure that the technology(s) selected are appropriate
The software must measurably improve audit techniques
for the intended usage — ranging from ad hoc, mobile use to
and shorten audit cycles right out of the box. Investments
centralized processing of large volumes of data. This should
in time and skills to develop analysis routines created during
take into consideration not only the immediate needs being
one audit can be used again on the same or similar audits
addressed, but also what capability levels are envisioned for
leading the function forward into continuous audit/moni-
the future. This needs assessment may result in hardware
toring processes.
acquisition costs for laptop computers, centralized server
Purpose-built data analytic technologies for audit
hardware, or additional data storage capacity.
have been around for over 20 years. Yet according to the
The use of data analysis technologies also requires the
PricewaterhouseCoopers 2010 State of the Internal Audit
support and commitment of an organization’s IT department.
Profession Study, auditors for the most part are not taking
The CAE should engage in planning with IT resources up
advantage of them effectively. The following chart illustrates
front to highlight the overall data analysis strategy, sought
the areas in which data analysis technologies are being used
after benefits, and data access requirements of the audit
most frequently.3
department. Data access protocols should be established up
When the right software is implemented, the results can
front, and any risks identified relating to the access, sharing,
be significant. Successful internal audit functions have
and storage of sensitive data should be addressed. This may
stakeholders that recognize the efficiencies in audit processes
entail the implementation of centralized data analysis capa-
and appreciate audit results that regularly disclose previously
bilities, where client/server architecture is implemented, or
the need for data encryption
and protection software to safe-
guard the organization from
Use of Data Analytic Technologies data loss.

60% Appendix B has an example


n Spreadsheets ranking matrix that can be
50% used to help evaluate various
software options for use in data
40% analysis.
n Databases

30%
4.2 Auditor Skill Sets
n Purpose-built
Data Analysis In deciding to implement
20% Technologies data analysis within an audit
department, the CAE needs to
10% n Other consider the skill sets that exist
within their department. For
0% some, the concepts involved
Control Data Substantive Continuous Continuous
in accessing and working with
Analysis Analysis Testing Controls Auditing
Monitoring data are beyond their experi-
ence or comfort level. The

Adapted from: A future rich in opportunity: Internal audit must seize opportunities to enhance its relevancy PricewaterhouseCoopers
3  

2010 State of the Internal Audit Profession Study, March 2010, p.22.

7
GTAG — Using Data Analysis Technology

the analysis without any scope expectations and


then try to make sense of the data. However, not
Attributes of Data Analysis Software understanding the scope can lead to results that
for Audit contribute little value or are irrelevant.
n Able to analyze entire data populations covering
the scope of the audit engagement. • Data location and access. Knowing what data
to find and where, as well as ensuring access to the
right data (e.g., data source files rather than altered
n Makes data imports easy to accomplish and metadata or extracts) before performing the data
preserves data integrity. analysis, can save internal auditors valuable time. In
addition, having access to the right data at the right
n Allows for accessing, joining, relating, and time can help achieve relevant and timely results.
comparing data from multiple sources. There are three considerations: the volume of data
required; the variety of data types, formats, and
n Provides commands and functions that support sources; and the veracity and accuracy of the data
the scope and type of analysis needed in audit sets.
procedures. • Data understanding. If the auditor does not
understand the data to be analyzed (the data’s
n Generates an audit trail of analysis conducted source, context, use, and meaning) faulty conclu-
that is maintained to facilitate peer review and the sions can be reached, regardless of the sophistication
context of the audit findings. of the analysis technique.
• Data preparation. Cleaning and preparing the
n Supports centralized access, processing, and data is important, especially when importing data
management of data analysis. from different source files. Consequently, internal
auditors need to spend time normalizing and aggre-
n Requires minimum IT support for data access or gating the information to make sure the format is
analysis to ensure auditor independence. consistent for all data, thus helping to ensure the
accuracy of results.

n Provides the ability to automate audit tasks to • Manually maintained data. Using data that
increase audit efficiency, repeatability, and support has been maintained manually can pose problems
for continuous auditing. pertaining to data integrity as change controls
might be lacking or ineffective. Whenever possible,
internal auditors should use automated data as the
CAE needs to determine if an investment in training of basis for the analysis and verify it against existing
existing personnel is needed, or if hiring of new staff with manually maintained data.
data analysis expertise is more appropriate. In either case,
some degree of training and professional development will The benefits of using data analysis are many, however,
most likely be required. This should be budgeted for in terms the items above should be considered by the CAE in imple-
of both time and money as an ongoing cost to ensure the menting and executing an effective data analysis strategy.
long-term success of their data analysis implementation. Many of these challenges and risks can be addressed through
professional development of audit staff, modification of audit
4.3 Potential Barriers procedures, and the technology selected for audit’s use. For
further guidance on how to provide assurance around the use
While the benefits of using data analysis technology are
of data analysis technologies and other user-developed appli-
generally well known, adoption rates show that there are a
cations, please refer to GTAG 14: Auditing User-developed
number of barriers to overcome before more widespread use
Applications.
of data analysis can occur. The CAE should be cognizant
of these barriers and address them to realize the gains data
analysis technology enables. The barriers include:

• Poorly defined scope. Once audit objectives are


determined, the scope of the intended use of data
analytics should be understood before starting the
analysis. Some internal auditors tend to jump into

8
GTAG — Elaboration on Key Technology Concepts

5. Elaboration on Key allows for unprecedented insight into organizational opera-


tions. Suspicious transactions may be detected sooner and
Technology Concepts corrective action initiated before problems escalate, become
material weaknesses, or require external reporting.
5.1 Technology Used for Data Analysis In recent years, data volumes have grown to the extent
that there may be too much data to consider downloading
Internal audit activities can choose either general purpose,
or importing to a PC for analysis. An effective data analysis
readily available tools such as spreadsheets, or look to
solution in today’s environment likely needs to incorporate
purpose-built technologies for analyzing data. The manifest
server-based platform solutions that provide a robust and
advantage of data analysis technology is that it addresses the
dependable technical architecture that preserves both the
specific needs of the auditor when analyzing data to evaluate
integrity and controlled access to data. In such a solution,
the operating effectiveness of internal controls, adherence to
data can be analyzed by the auditor within the secure IT
specific compliance requirements, assessing organizational
environment, thereby reducing network traffic and mini-
risk, and detecting indicators of fraudulent activity. For
mizing the risks involved in converting, duplicating, and
additional guidance related to fraud detection, see The IIA’s
disseminating sensitive organizational data.
Practice Guide, Internal Auditing and Fraud and GTAG 13:
Fraud Prevention and Detection in an Automated World. Variety
When evaluating a data analysis technology for auditing,
there are a number of essential attributes that should be Most organizations rely on several applications that run on
considered. These may be divided into three areas: a variety of operating systems, collecting data in a variety of
formats or databases. While generalized data analysis soft-
• Data access. ware has become more adept at importing data, they still fall
• Audit-specific capabilities. short of being able to deal with data from different formats
and operating environments. The risk is the inadvertent
• Logging and automation. modification of the data during the conversion process.
For instance, mainframe data is usually in extended binary
5.1.1 Data Access coded decimal interchange code format and cannot be read
by a PC-based spreadsheet without conversion.
Simply accessing the data required for an audit can be a An effective data analysis solution for audit needs to be
daunting task. This is due, in part, to the amount of time able to read and compare a broad variety of data formats
it can take to receive data extracts from busy IT depart- including relational data, legacy data, spreadsheets, report
ments. Under pressure to do more in less time and with files, flat files, extensible markup language, and eXtensible
fewer resources, auditors are looking to eliminate obstacles business reporting language-formatted data. Where data
and streamline audit processes. An effective data analysis resides in databases, an effective technology needs to be able
technology enables auditors by providing them with direct to access this data quickly and efficiently to meet internal
data access either by “pulling” data on demand or by sched- audit’s needs.
uled data “push” techniques for regular data feeds in support
of continuous auditing or repetitive testing of specific data Veracity
sets. This has the joint benefit of streamlining the overall
audit process and relieving busy IT staff from repeated data Veracity, or the truthfulness or accuracy of data, is paramount
requests by the audit function. in the audit process. An effective data analysis technology for
There are three additional data access challenges that audit purposes must protect the integrity and quality of data.
need to be overcome to assist audit’s use of data analysis tools: With data extracts and format conversions, the integrity of
data can be inadvertently compromised and introduce unin-
• The volume of data required to provide effective tended audit risk into the process. An effective data analysis
assurance of organizational processes. technology must be able to access and analyze data without
altering it or subjecting it to accidental change.
• The variety of data types, formats, and sources.
Effective data analysis tools for audit need to protect the
• The veracity or truthfulness and accuracy of the user from accidentally changing values and the integrity of
data sets. the records in the data set. It must preserve the veracity of
the data to prevent the skewing of analytical results, which
could lead to material errors in findings and erroneous audit
Volume recommendations.
An effective data analysis technology for internal audit While the selected data analysis technology should protect
must be able to analyze entire data populations to ensure that the integrity and quality of the source data from alteration,
the entire picture is visible. Analysis of entire data populations often the source data itself has inherent data quality errors

9
GTAG — Elaboration on Key Technology Concepts

or deficiencies. When using data analysis, auditors should the auditor needs to have a data analysis tool that allows
always check the data for validity errors. Getting the correct them to visually present these data files in relationship to
and complete data is a prerequisite of effective data analysis. one another.
For instance, do the numeric fields in the source data contain When using data analysis, auditors need to compare and
valid numbers — or are characters present in this field or contrast diverse sources of information, validate data integ-
are there blank entries? Do key fields, such as social security rity and accuracy, and look for patterns and anomalies
or social insurance numbers, contain valid entries? Does the in data. The audit process may need to support assertions
data contain records within the expected date range or is it inherent in published financial statements such as complete-
under- or overrepresented in the data set? When source data ness, accuracy, occurrence, valuation, and presentation. Data
errors are identified, data extracts should be repeated to get analysis software may have algorithms designed to perform
the expected data range, data cleansing activities should be these tests without having to program custom queries or
conducted to correct faulty data fields, or “bad data” should macros to reduce the audit risk in user developed applica-
be isolated from the main analysis and subsequently investi- tions (UDAs). For additional guidance related to UDAs, see
gated to see if it substantially impacts the overall assessment GTAG 14: Auditing User-developed Applications.
of the audit. Purpose-built data analysis software will have commands
and functions that look for duplicates; detect gaps in numeric
5.1.2 Audit-specific Capabilities sequences; and group transactions by type, numeric range,
and age. The ability to filter vast amounts of data quickly
Data analysis technology for internal audit’s use needs to
and efficiently also is a key requirement. Advanced pattern
have the features and functionality that auditors require
detection techniques, such as digital analysis, are extremely
to do their job effectively. Not only should it deal with the
helpful when seeking anomalies in data.
data access challenges, but it also needs to support the way
When comparative analysis is required, the technology
in which auditors work and the types of analytics that are
needs the ability to merge data files (often from different
appropriate to the audit task.
sources and in different formats) and look for matched or
Some aspects of data analysis involve assessing the integ-
unmatched records. For tasks requiring the comparison of
rity of organizational processes and practices, evaluating the
data from numerous sources, the ability to relate diverse data
efficacy of controls, conducting risk assessments, and, in
sets together also may be necessary. Because the audit process
some cases, fraud detection. Invariably this means that data
often involves retrospective analysis of vast amounts of data,
must be analyzed from a diversity of sources to seek patterns
an effective data analysis technology needs highly efficient
and relationships. Auditors need to organize their view of the
read algorithms to process millions of records rapidly. These
company data in a way that suits the audit objectives.
algorithms must be powerful and reliable to perform tasks
This view gives users the ability to set an appropriate
either quickly in interactive data analysis or for sustained
context from which to compare and contrast data from
periods of time in lengthy and complex automated analysis.
diverse sources. For example, if part of an audit process is
Depending on the nature of the audit work being done, this
fraud detection, data analysis may be used to great effec-
interactive work can be ad hoc for planning, initial scoping,
tiveness. One might compare an employee master file with
or investigative work. It also can be scripted for repetitive
an approved vendor database. If there is a match between
analysis of organizational processes from period to period,
an employee’s address and the address of a vendor, it might
such as quarterly reviews of key controls. In organizations
indicate the presence of a “phantom vendor” and that an
that want to implement a continuous auditing methodology,
employee is attempting to perpetrate fraud. In such a case,

Data analysis tasks can be grouped into three types:


Ad Hoc Repetitive Continuous
Explorative and investigative in Periodic analysis of processes from multiple data “Always on” — scripted auditing and monitoring
nature. sources. of key processes.

Seeking documented conclusions Seeking to improve the efficiency, consistency, and Seeking timely notification of trends, patterns
and recommendations. quality of audits. and exceptions.
Supporting risk assessment and enabling audit
efficiency.

Specific analytic queries — per-


Managed analytics — created by specialists — and Continual execution of automated audit tests to
formed at a point in time — for the
deployed from a centralized, secure environment, identify errors, anomalies, patterns and excep-
purpose of generating audit report
accessible to all appropriate staff. tions as they occur.
findings.

10
GTAG — Elaboration on Key Technology Concepts

the data analysis technology selected must be able to support audit management that opinions expressed in audit reports
the scheduling and automation of data analysis tests. are accurate and that the audit recommendations are sound.
An example of an ad hoc analysis could be ‘suspicious A final benefit of an audit trail is the ability to recall
vendor’ and ‘phantom employee’ analysis for acquisition previous results. An audit trail records not only the
due diligence. An audit team member could generate a few commands and functions used to identify exceptions and
specific queries comparing vendors to employees to see if anomalies, but also intermediary and final results. In this
there is a match. If there is, this may be an area warranting way, auditors may compare past findings with current find-
deeper analysis. Ad hoc is often explorative and investigative ings to see if the recommendations have been acted upon, or
in nature and helps target high-risk areas for more involved if there is a substantive shift in the behavior of the organiza-
analysis. tion that may be an indicator of emerging risk.
A repetitive analysis example could be a quarterly journal If meaningful results or insight are achieved through a
entry analysis. Data analysis can be used to help validate the data analysis process during an audit, they are probably
operating effectiveness of controls in this area and identify worth repeating again in the future. An effective technology
control failures — even in manual controls. For instance, enables simple and straightforward task automation. Effective
data analysis can be used to identify: technologies provide for a variety of ways to automate analyt-
ical tasks either through a “task recorder” functionality or
• Journal entries by unauthorized or restricted users. through the selection of commands recorded in the audit
• Duplicate journal entries. trail.
It is through task automation that auditors themselves
• Invalid account postings. may create batteries of tests to streamline the overall audit
• Journal entries pre- and post-period close. process and contribute to the aspects of continuous auditing
involving the recurring analysis of data to identify indicators
• Frequently reversed journal entries. of failed controls, noncompliance, and fraudulent activity.

An example of continuous analysis could be a pay cycle


review in a high transaction environment with the need for 5.2 The Link Between Data Analysis
weekly reporting to a third-party recovery partner. In this and Continuous Auditing
case, there is a need to provide continuous reports and iden- The use of data analysis can span a diversity of needs and
tify exceptions and gaps via user-defined parameters in line approaches, and allows for efficient analysis across this
with internal controls. continuum.
There has been much written and discussed in recent years
5.1.3 Logging and Automation about the increasing expectations placed on internal auditing
One of the keys to improving audit performance and driving and the importance of technology — specifically data anal-
better results is the ability to automatically record what has ysis, continuous auditing, and monitoring — to help internal
been done and reliably repeat it in subsequent areas or audits. audit and management achieve their respective goals.
It is for this reason that more effective data analysis technolo-
gies automatically generate comprehensive audit trails. They The effective use of data analysis technology is a precursor
also provide for reliable task automation, from accessing the for continuous auditing. Competency in understanding
data at source, to verifying its validity, to performing the key business processes and being able to analyze and inter-
detailed analysis, and generating audit reports. pret the data that reflects those activities is a requirement.
There are a number of attributes that constitute an effec- Likewise, internal audit departments need to develop
tive audit trail. An effective audit trail is one that records all increasing levels of sophistication in using data analysis if
of the commands run by the application, status messages that they are to implement a technology-enabled continuous
provide insight into command execution, and any results auditing methodology. The CAE should be able to assess the
generated by the actions of the user. This provides a number levels of sophistication or capability within their department
of critical artifacts for an effective audit, including a context to ensure that it aligns with their departmental goals. For the
for the audit findings. purposes of this GTAG, five capability levels are discussed.
The audit trail documents the steps taken to uncover excep-
tions that can now be explained, substantiated, and defended Level 1 – Basic Use of Data Analysis
where necessary. The audit trail also provides a mechanism This level is characterized by the basic use of data analysis
for peer or supervisory review. Review of audit steps is an technology to perform queries and analyze data in support of
important activity to ensure the accuracy, completeness, a specific audit objective. Activities typically include statis-
and quality of the audit process. This review demonstrates to tical analysis, classifications, or summarization of data. Usage

11
GTAG — Elaboration on Key Technology Concepts

is usually ad hoc by a limited number of audit staff and may Level 4 – Automated
be unplanned.
This use of data analysis helps auditors rapidly gain insight
into risk and control issues in a given audit area. However,
there is room for improvement. The use of data analysis tech- Define the term Continuous Auditing.
nology can be better integrated into audit procedures and at Solution:
different stages in the audit cycle. This requires an invest-
ment in changing audit processes — educating audit staff in “Continuous auditing is any method used by audi-
the concepts of data analysis and the technology itself. tors to perform audit-related activities on a more
continuous or continual basis. It is the continuum of
Level 2 – Applied Analytics activities ranging from continuous controls assess-
ment to continuous risk assessment — all activities
Usage at this level builds on the basic level and is charac-
on the control-risk continuum. Technology plays a
terized by data analysis being fully integrated into targeted
key role in automating the identification of excep-
audit processes. Both audit planning and the design of an
tions and/or anomalies, analysis of patterns within
audit program take data analysis into account — effectively
digits of key numeric fields, analysis of trends,
creating a “data analysis-enabled audit program.” Within this
detailed transaction analysis against cut-offs and
more structured approach to using data analysis, compre-
thresholds, testing of controls, and the comparison
hensive suites of tests may be created, reviewed, and subject
of the process or system over time and/or other
to quality assurance procedures. Usage is often progressive,
similar entities.”
with additional tests being added over the course of time and
during each repetition of an audit process.
 ~GTAG 3: Continuous Auditing: Implications for
At this stage, data analysis begins to transform the audit
Assurance, Monitoring, and Risk Assessment.
process, providing substantial improvements in efficiency,
levels of assurance, and the overall value of findings. Certain
tasks can be performed in a fraction of the time it previ-
ously took, thereby enabling audit to focus on areas of new The Automated level builds on the capabilities estab-
or evolving risk. lished to support Managed Analytics. The building blocks
established at the previous levels form the basis for increased
Level 3 – Managed Analytics automation of analytic processes and, where appropriate,
The Managed level is the logical evolution from the the implementation of continuous auditing. Data access
Applied stage. This increased level of sophistication is protocols have been established for the automated running
in response to some of the challenges inherent in a more of analytic tests. Comprehensive suites of tests have been
widespread, decentralized use of data analysis. In this more developed, tested, and are available in a central, controlled
organized and controlled approach to data analysis, data, environment.
audit tests, results, audit procedures, and documentation are However, continuous auditing requires more than
housed in a centralized and structured repository. Access to addressing technology issues. It requires a significant shift
and use of this content is aligned with key audit procedures in audit processes compared to traditional auditing methods.
and is controlled and secure. This makes it more practical for Most internal audit departments commence continuous
nontechnical audit staff to access and use the results of tests. auditing in one area and then expand to additional areas over
Once data analysis is managed centrally, audit teams can time as appropriate procedures are established. The result of
benefit by increased efficiency through the sharing of data the use of automation is that it becomes possible to perform
analysis work (data, tests, and results). Data analysis use is concurrent, ongoing auditing of multiple areas.4
repeatable, sustainable, and easier to maintain the overall While effective continuous auditing provides clear benefits
quality and consistency of analytic work. It is at this level in terms of audit productivity and effectiveness, there remains
that the basic building blocks for continuous auditing are a risk that findings are not communicated to management or
in place. One of the key benefits of this level is also that are not acted on in a timely manner by management to add
of making the whole process more sustainable by reducing value to the business through improved controls and business
the risks of relying on individual specialists who may leave, performance. When implementing a continuous auditing
taking critical knowledge with them. Analytic procedures at
this level are well documented and centralized in a way that
makes review by management easier and more efficient.
4  
For additional information on continuous auditing, please refer
to GTAG 3: Continuous Auditing: Implications for Assurance,
Monitoring, and Risk Assessment.

12
GTAG — Elaboration on Key Technology Concepts

approach, processes need to be put in place to ensure that


findings are communicated to management effectively and
Benefits of CM and CA 5

procedures are put in place to ensure that the issues identi-


fied are being acted on. Continuous monitoring can enable an
enterprise to:
Level 5 – Continuous Monitoring • Increase value through improved financial and
Once a continuous auditing program has been established, operating controls
with internal audit regularly producing reports on control • Accelerate reporting to support more rapid deci-
problems and potential instances of error, fraud, or compli- sion making and business improvement
ance failures, then the logical next step is to have management • Detect exceptions in real time to enable real-time
take over the monitoring of their own processes. responses
Internal audit is often in the best position to demonstrate • Reduce – and ultimately minimize – ongoing
to management the value of data analysis in detecting control compliance costs
problems and improving operational performance. By encour-
• Replace manual preventative controls with auto-
aging and supporting the implementation of continuous
mated detective controls
monitoring, the benefits of data analysis techniques become
evident to a wider audience and start to become applied more • Establish a more automated, risk-based control
broadly. The ability to identify and quickly resolve excep- environment with lower labor costs
tions such as fraud, error, and abuse has a clear value and can • Heighten competitive advantage and increase
provide a quantified benefit to the organization. value to stakeholders
Continuous monitoring also can become an impor- Continuous auditing can enable an enterprise to:
tant component within an organization’s risk management
processes, helping to provide business with a clearer picture • Improve risk and control assurance, usually in the
of risk issues and trends. same or less time than previous approaches
In general, the view of the internal audit profession is that • Reduce costs, including internal audit costs
management is responsible for continuous monitoring and and costs associated with unaddressed control
internal audit should independently assess the impact of those deficiencies
activities. Using this approach, the desired outcome can be • Increase the level of risk mitigation for business
a combination of continuous auditing performed by internal risks
audit and continuous monitoring performed by management, • Achieve a more robust, more effective auditing
which together provide continuous assurance over the trans- process
actional integrity and the effectiveness of controls. • Expand internal audit coverage with minimal (or
no) incremental cost
• Shorten audit cycles
• Identify control issues in real time

5 
Continuous monitoring and continuous auditing: From idea
to implementation, © 2010 Deloitte Development LLC

13
GTAG — Where Should Internal Auditors Begin?

6. Where Should Internal methodology to how they evaluate risk, validate the efficacy
of internal controls, and identify areas of noncompliance.
Auditors Begin? This also assists how they interpret the results of analysis
performed. Are the results indicative of poor internal
A reality of today’s highly automated world is that almost controls, system deficiencies, poorly trained staff, or indica-
every auditor must analyze data. What was once considered tors of fraud? By understanding data, these determinations
a special expertise, a job for IT auditors, or a task that was can be made and will assist in improving audit performance.
easily outsourced to another department or organization, Training also is necessary for the effective use of the
has become a core competency for the profession of internal technology selected. The internal audit department should
auditing. establish what their desired end-state of technology use is
Internal audit leadership can start the process by first (i.e., ad hoc use, highly automated audit routines, or imple-
assessing the strategic goals of the data analysis activities menting continuous auditing). A training regimen needs
of their function. There are many software products on the to be put in place with the outcome in mind to ensure it is
market that will catch the attention of staff. Proceeding achieved according to established project schedules.
without first establishing what the function needs to achieve
and how to achieve it can cause the process to fail. Roles and Responsibilities. Auditing is a team activity
that requires different roles to ensure effectiveness and
Internal Audit Leader Strategies
quality of work accomplished. In small departments, staff
for Data Analysis Clarified
may be responsible for more than one role. CAEs may want
Defining and executing a strategic plan supported by and to consider establishing specialized roles within their audit
aligned with management and the audit committee is a good teams to effectively deploy data analysis software tools. Some
place to begin. Depending on the starting point, this may of the key roles could be:
require internal audit leaders to take a hard look at all aspects
of their scope, people, processes, and technologies, and really • Data Specialist – Member of the audit team or an
explore whether or not they have the right strategy and capa- IT resource assigned to the audit team who has
bilities in place. It is hard to bring about significant change a detailed understanding of the organization’s IT
without a plan. Internal audit organizations that break down infrastructure, data sources, and how to access
their vision and goals into key initiatives that can be tackled relevant data to be analyzed. They will understand
logically and systematically also are the ones most likely to how to access large volumes from disparate systems,
succeed in driving value in their organizations. prepare that data for analysis, and make that data
While this GTAG is focused on data analysis technology, available to the team.
it is important to point out that technology alone will not • Data Analysis Specialist – Member of the internal
achieve the desired outcomes and benefits articulated herein. audit team who is well versed in the detailed use
For internal audit departments to be successful and achieve of the technology of choice, and who will perform
rapid and recurring returns on their software investment, advanced query and analysis, create and manage
three key areas need to be addressed: people, process, and automated audit routines, and validate and share
technology. results of the analysis across the team.
Without addressing each of these key areas, an effective
data analysis program will not be possible. • Staff Auditors – These members of the internal
audit team will have a general understanding of data
People and data analysis software, and will have sufficient
While internal audit departments vary in size and struc- competency to review and interpret the results of
ture, there are certain functions that need to be addressed automated analytic routines and perform simple
— either by an individual or several staff members. The analysis (sorting, filtering, grouping, and profiling).
larger the department, the greater the degree of specializa- They also will be trained to document and report on
tion can occur. the findings of the analysis performed.
• Internal Audit Leadership – The team’s leaders
Training and Education. Internal audit departments need should have visibility into what audit steps have
to be educated on the concepts of data, data analysis, and been automated or are dependent on the use of data
the interpretation of analytical results. With the adage “the analysis software. This will assist in the oversight
truth is in the transactions,” auditors can change the way of audit activities and overall audit coverage and
they think about examining organizational processes or lets audit leaders review analytic findings across the
compliance requirements. With a deeper understanding of team and against audit plan objectives.
how an organization’s activities get recorded electronically
in data files and databases, auditors can apply a data-driven

14
GTAG — Where Should Internal Auditors Begin?

Process 2. Manage your data analysis initiative like a program,


Integrating data analysis into an audit plan will change focusing on your desired end-state of maturity.
the way the audit is conducted, so changing audit processes, 3. Develop a uniform set of analytic practices and proce-
procedures, and schedules is necessary. As noted above, data dures across assessment functions.
analysis techniques can be utilized throughout an audit cycle, 4. Assign responsibility for data management, quality
so process changes at each stage need to be considered — assurance, and other key roles.
not just at the testing phase. In some cases, audit planning 5. Document and/or comment scripted analytics to
and preparation may take longer than normal when using record the intent and context of the analysis being
technology as data-driven indicators or when risk or controls automated.
weaknesses may affect the audit plan. Where data from 6. Review and test analytics being used to ensure the
multiple sources is deemed required, additional preparation results being generated are accurate and appropriate for
time may be needed to get access to the data. CAEs may the audit step being run.
want to consider adding access and authorization privileges 7. Establish a peer review or supervisory review process
to their organization’s data in their audit charter to stream- of analytics performed to safeguard against the reli-
line this part of the process. ance on results generated from using incorrect logic or
Where the use of data analysis extends to parts of the formulas during analysis.
overall continuous auditing process, significant changes to 8. Standardize procedures and tests in a central and
internal processes will be required to ensure that organiza- secure repository.
tional units are prepared to receive timely notification of 9. Safeguard source data from modification/corruption
exceptions and establish a mechanism of managing those — either through the type of technology being used
exceptions to close the loop on findings. to conduct the analysis or by analyzing back-up data or
mirrored data for audit purposes.
Technology 10. Address the potential impact of the analysis on
production systems, either by scheduling analysis at off-
There are a variety of data analysis technologies to choose peak times or by using back-up or mirrored data.
from. The key is to choose the right technology for your orga- 11. Educate staff on how to interpret the results of the
nization’s audit tasks, objectives, and IT environment. CAEs analysis performed.
should consider what they want to accomplish in the long 12. Treat training as a continuous process, measured
term and choose the right data analysis technology or suite by ongoing growth and continuous development of
of technologies to achieve their objectives. capabilities.
Regardless of what decisions are made with respect to 13. Aim for constant improvement through leveraged use
people, processes, or technology, it should be emphasized that of data analysis software as analytics evolve over time.
internal audit departments should start with a risk assess-
ment that aligns the audit scope with the audit objectives.

Obstacles
Embarking on an increased focus on data analysis using
technology will likely have obstacles and challenges. The
most common obstacles include underestimating the effort
required to implement correctly, lack of sufficient under-
standing of the data and what it means, and the need to
develop the expertise to appropriately evaluate the excep-
tions and anomalies observed in the analysis. These and
other obstacles are best addressed through a well thought out
plan that commits sufficient resources and time.
A decision to invest in implementing or improving data
analytic capabilities needs to be appropriately managed to
ensure maximum benefit is obtained, with the least amount
of cost. A few recommendations to help accomplish these
goals are:

1. Align your overall data analysis strategy with your:


a. Risk assessment process.
b. Current audit plans.
c. Long-term audit goals and objectives.

15
GTAG — Conclusion

7. Conclusion
Because almost every activity conducted in an organization
is either enabled or impacted by technology in one form or
another, it is nearly impossible to conduct an audit without
using technology. Current audit standards require the use
of data analysis for good reason. The data that is processed
and collected by organizations is, in essence, the electronic
life-blood of that organization. Being able to scrutinize and
evaluate the overall health of an organization by analyzing
data is a necessity.
To that end, data analysis should be viewed as an enabling
technology that can deliver great value to internal audit in
the areas of improving efficiency, effectiveness, and levels
of assurance that can be provided. Its impact is not limited
solely to reducing the amount of time to conduct an audit
but also to aid in the detection of errors, control breaches,
inefficiencies, or indicators of fraud. Additionally, leading
practitioners also are finding better and more effective ways
to determine what audits to perform, what areas are high risk,
and what business processes require greater attention during
detailed audit work. When employed across the audit cycle
— from data-driven to insights in risk assessment, planning
and preparation, testing, review, and reporting — internal
audit can dramatically increase the value it provides and
enhance its reputation within its organization. 
Deciding where and when to use data analysis should be
a strategic decision made by the CAE. By employing data
analysis, it must be recognized that there will be changes to
what audit staff need to know, what processes and activities
need to be carried out, and what technology or technologies
can be leveraged to gain the desired benefits. Getting the
right data, understanding what the analytics are indicating,
and following up on the results of analysis can be a signifi-
cant task. The returns, however, can raise the level of respect
for internal audit departments and the profession as a whole.

16
GTAG — Appendix A: Example – Data Analysis for Procurement

Appendix A: Example – Data Analysis for Procurement


Procurement

Area Control Data Analysis


Purchasing of goods Application will not allow Obtain purchase order data
a duplicate payment to be Validate that no duplicate payments (same vendor/same
processed. account) were processed.

Purchase orders (POs) older Obtain a list of all POs processed


than three months will not be Determine if POs older than three months were processed.
processed.

The person who creates the PO Obtain a list of all POs created (by originator)
can’t release/approve the same Obtain a list of all POs released or approved
PO. Determine if any inappropriate segregation of duties (SOD)
existed.

Receiving of goods All goods received (GR) are Obtain a list of all GR and all POs placed
validated against PO. Validate that quantities are the same.

The person who created the PO Obtain a list of who signed for the GR (processor)
can’t process any goods that are Obtain a list of who created the PO
received. Determine if any inappropriate SODs existed.

Invoicing PO should be created before Compare PO dates against invoice dates and make sure there
supplier invoice is received. are no POs dated after invoices dates.

Amount on PO should agree Compare the PO amount against the invoice amount
with amount on invoice. Validate that there are no differences.

Segregation of duties (SOD). Obtain a list of who has processed invoices and who created
the PO
Determine if any inappropriate SODs existed.

Payment Application should not allow Obtain a list of all payments that have been made to vendors
duplicate payments. in the last 12 months
Determine if duplicate payments have been made, for
example:
• Same vendor ID and amount but different invoice number.
• Same vendor ID and invoice number but different amounts.
• Different vendor ID with same bank account detail.

Segregation of duties (SOD). Obtain a list of who has processed payment and of who cre-
ated the PO
Determine if any inappropriate SODs existed.

Updating vendor Ensure that duties are properly Obtain the procurement end-user list (users that have access
records and adding segregated to guarantee ap- to the procurement application and the functions that each
new vendor files propriate control. user has)
Determine what functions are conflicting and create a report
that identifies those users.

17
GTAG — Appendix A: Example – Data Analysis for Procurement

Procurement

Area Control Data Analysis


Audit trail that documents what Obtain the audit trails that contain the details of changes that
detail was changed when and were made to vendor records
by what user. Determine if only authorized people made changes
Identify possible trends of those who are making changes the
most.

Identify key fields (e.g. bank Obtain a list of staff bank accounts with direct deposit
account detail that should be Compare account information with the bank detail that was
monitored through manage- updated on the vendor record.
ment sign-off).

Sufficient application 1. Valid code test. 1. Obtain a monthly download of program code within the
controls to ensure procurement application  Determine if any changes were
accurate input, pro- 2. Check digit. made to the code through data analysis.
cessing, and output 3. Field check. 2. Obtain the standing data of vendors  Validate that the
4. Limit test. Income Tax number captured is the correct length.

5. Reasonableness check. 3. Obtain the standing data of vendors  Validate that only
numerical values are captured in the bank account and
6. Sequence check. phone number fields.
7. Batch control totals. 4. Obtain a list of all procurements that were made in a
month  Validate that all payments above a certain
amount (e.g., US $50,000) were authorized by the
appropriate user.
5. Obtain a list of all procurements made in a month 
Create a trend analysis, per vendor or per procurement
type, to identify transactions out of the ordinary.

Value adding servic- N/A 1. Total dollars spent.


es to organizational
users 2. Average transaction amount.
3. Transactions per vendor.
4. Dollars spent per vendor.
5. Sort transactions by vendor or commodity.
6. Trend analysis (e.g., seasonal products).
7. Budget vs. actual
8. Age analysis (e.g. GR vs. invoice date)

18
GTAG — Appendix B: Ranking Matrix for
Data Analysis Software Selection

Appendix B: Ranking Matrix for Data Analysis Software Selection



Need: 0=Needless; 1=Nice to Have; 2=Desirable; 4=Mandatory. Need
Internal Auditing Strategic Objectives

1 Software is easy to learn and use  


2 Competitive advantage  
3 Minimize reliance on IT professionals  
4 Improve work accountability, responsibility, and supervision  
5 Enforces production program change controls  
6 Reliability: bug free, speed, work like a professional  
7 Portability: runs on a laptop  
8 Scalable: grow from desktop to server without learning new software  
9 Data integrity and security: client data is protected from auditor change  
10 Collaborative features  
11 Supports development of automated and continuous programs  
12 Compatible with electronic workpapers  
13 Improves documentation of audit work completed  
Provider & Implementer Support

14 Global presence  
15 Years in business  
16 Multiple languages  
17 Help desk available  
18 Ease of doing business; knowledgeable in auditing needs  
19 Regular software upgrades  
20 Training readily available  
21 User group program for networking with other users of the software  
22 Knowledgeable consultants independent of the provider readily available  
23 Getting started programs available  
Technical Features & Functionality

24 Import all file types used by the organization  


25 Handle large file record sizes  
26 Handle large data volumes  
27 Ease in validating and reconciling data import  
28 Modify imported data field properties  
29 Support search for text, numbers, time  

19
GTAG — Appendix B: Ranking Matrix for
Data Analysis Software Selection

Need: 0=Needless; 1=Nice to Have; 2=Desirable; 4=Mandatory. Need


30 Project visual chart or mapping of data actions performed  
31 File join/merge/compare  
32 File append  
33 Visual connector  
34 Sorts, indexing, filtering, and fuzzy logic
35 Summarization
36 Extraction
37 Pivot table
38 Stratification
39 Gap detection
40 Aging
41 Compare data to predicted data according to Benford’s Law
42 Advanced statistical analysis: correlation, trend analysis, time series
43 Sampling
44 Statistical analysis
45 Export to typical office applications
46 Create custom reports and graphics
47 Create simple and complex calculated fields
48 Data cleansing tools – @functions available
Cost
49 Software purchase
50 Job aids – automated scripts and specialty components
51 Upgrade fees
52 Annual help desk support

20
GTAG – Appendix C : Audit Department
Data Analysis Usage Maturity Levels

Appendix C : Audit Department Data


Analysis Usage Maturity Levels
The following table can be used by audit leaders to assess the maturity level of their data analysis usage within their depart-
ments, with an eye toward increasing the levels of assurance and value-adding services they can provide. Alternatively, the
descriptions and attributes listed therein also can be used to formulate a data analysis strategy that will improve efficiency and
effectiveness within their departments. It is recognized that different maturity levels can exist within a single internal audit
group, depending on which part of the organization they are auditing.

Level Description Attributes


Fully Optimized Data analysis is engrained in all audit programs. Companywide recognition and support for data
The audit department relies heavily on data analysis analysis as a core competency of the internal
technology during all stages of the audit plan. Many audit function to support the expected assur-
audit processes are automated to ensure the quality ance and consulting services.
and consistency of results. Data analysis technol-
ogy is acknowledged as an essential component in
enabling the audit function to complete their audit
plans.

Integrated Data analysis is used in every applicable audit en- Top-down support to meet functional strategic
gagement, and in each stage of the audit cycle from directives is in place. It is recognized that data
risk assessment, planning, preparation, testing, issue analysis can assist internal audit in providing
follow-up, and reporting. Proficiency in data analysis heightened levels of assurance by looking for
technology is a job requirement for some or all of unauthorized, incomplete, or inaccurate data or
the audit staff, depending on its size and make-up. seeking indicators in the data that can lead to
Close integration exists with IT and the rest of the recommendations to improve the organization’s
organization regarding access to pertinent data and overall performance.
dissemination of results.

Isolated and The audit department has some individual or single Some false starts and activities not necessarily
Occasional resources versed in the use of data analysis soft- sustainable for a long period. Acquire profes-
ware. Oftentimes the role of data analysis has been sional data analysis tools without the opportuni-
centralized to one individual. Application of data ty to fully implement. Realize that “peer” groups
analysis in audit programs is sporadic and unformu- may be making significant strides. Push for data
lated. Challenges exist in acquiring data from IT. analysis skills more bottom-up driven.

Reliant Primarily Audit processes make use of spreadsheets for light Starting to recognize the need for independent
on Spreadsheets analysis (sorting, calculating, control totals, sums, verification and objectivity. Starting to become
etc.), sampling of small data sets, limited use of aware of the possibilities. Generalized software
macros to locate anomalies in subpopulations of tools employed with known limitations.
data.

Print/ Auditors spot-check printed copies of documenta- Relying on the work of others. Development of
Paper-based tion seeking evidence of controls compliance. data analysis skills are in its infancy, in the plan-
ning stages at best.

21
Your Trusted Partner for Audit Analytics

Take your audit analytics


to the next level.

acl.com/steps

The new ACL Audit Analytic Capability Model provides


clear guidance for organizations looking to improve
their use of analytics. It’s how to talk to the business
about the value of audit.
Theodore K. Walter CPA
Manager, Financial Audits, Scripps Health
Unhappy with your current audit software?
Still using a spreadsheet for audit analysis?

It’s time to take a closer look at

IDEA
IDEA has over 120,000 active users globally, many of
CaseWare IDEA Inc. is pleased whom are IIA members. Auditors in over 90 countries in
to support the internal audit 16 languages use IDEA to outperform peers and exceed
profession and the IIA as a the expectations of clients, employers and regulators.
Principal Partner.
For more information about IDEA and to request a Free

Demo, visit our website at www.caseware-idea.com.

For over 20 years, IDEA – Data Analysis Software has set the
standard for ease-of-use, performance and functionality.

IDEA is a registered trademark of CaseWare International Inc.


About the Institute
Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with
global headquarters in Altamonte Springs, Fla., USA. The IIA is the internal audit profession’s global voice,
recognized authority, acknowledged leader, chief advocate, and principal educator.

About Practice Guides


Practice Guides provide detailed guidance for conducting internal audit activities. They include detailed processes
and procedures, such as tools and techniques, programs, and step-by-step approaches, as well as examples of
deliverables. Practice Guides are part of The IIA’s IPPF. As part of the Strongly Recommended category of
guidance, compliance is not mandatory, but it is strongly recommended, and the guidance is endorsed by The IIA
through formal review and approval processes.

A Global Technology Audit Guide (GTAG) is a type of Practice Guide that is written in straightforward business
language to address a timely issue related to information technology management, control, or security.

For other authoritative guidance materials provided by The IIA, please visit our website at www.theiia.org/
guidance.

Disclaimer
The IIA publishes this document for informational and educational purposes. This guidance material is not
intended to provide definitive answers to specific individual circumstances and as such is only intended to be used
as a guide. The IIA recommends that you always seek independent expert advice relating directly to any specific
situation. The IIA accepts no responsibility for anyone placing sole reliance on this guidance.

Copyright
Copyright ® 2011 The Institute of Internal Auditors. For permission to reproduce, please contact The IIA at
guidance@theiia.org.

8/11586/MC/MF

www.theiia.org

You might also like